Malware Analysis can operate as a service on a Decoder or as a service on a dedicated appliance. This guide includes instructions for setting up the operating environment and then configuring the Malware Analysis service. After this configuration is complete, analysts can conduct malware analysis.
These are the required configuration steps for Malware Analysis, and also for editing the configuration. Perform the steps in the section in the sequence they are given.
Basic Configuration Checklist
The following checklist provides the sequence for tasks that are required to configure Malware Analysis that has been added to NetWitness Suite in accordance with the Hosts and Services Guide.